OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway authentication material, and channel credentials that should have been redacted.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway authentication material, and channel credentials that should have been redacted. | |
| Title | OpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-212 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-05T11:24:59.369Z
Reserved: 2026-05-01T16:56:19.947Z
Link: CVE-2026-43528
No data.
Status : Received
Published: 2026-05-05T12:16:18.917
Modified: 2026-05-05T12:16:18.917
Link: CVE-2026-43528
No data.
OpenCVE Enrichment
Updated: 2026-05-05T13:00:07Z